From 3c3ca9ca72607678235f3f57b4634f788778aac2 Mon Sep 17 00:00:00 2001 From: Sean O'Hair Date: Tue, 19 Nov 2024 16:34:54 -0700 Subject: [PATCH] feat: update jobs version to avoid deprecation Signed-off-by: Sean O'Hair --- .github/workflows/build.yaml | 6 +++--- .github/workflows/codeql.yaml | 8 ++++---- .github/workflows/reports.yaml | 2 +- .github/workflows/reviewdog.yaml | 6 +++--- .github/workflows/scorecard.yml | 8 ++++---- .github/workflows/trivy-scan.yaml | 6 +++--- .github/workflows/trivyimagescan.yaml | 18 +++++++++--------- 7 files changed, 27 insertions(+), 27 deletions(-) diff --git a/.github/workflows/build.yaml b/.github/workflows/build.yaml index 9183f4b..b75f701 100644 --- a/.github/workflows/build.yaml +++ b/.github/workflows/build.yaml @@ -15,7 +15,7 @@ jobs: runs-on: ubuntu-latest steps: - name: Checkout code - uses: actions/checkout@v3 + uses: actions/checkout@v4 - name: Make platform Docker images run: | cd docker && make build-platform @@ -23,7 +23,7 @@ jobs: runs-on: ubuntu-latest steps: - name: Checkout code - uses: actions/checkout@v3 + uses: actions/checkout@v4 - name: Make xpum Docker images run: | cd docker && make build-xpum @@ -31,7 +31,7 @@ jobs: runs-on: ubuntu-latest steps: - name: Checkout code - uses: actions/checkout@v3 + uses: actions/checkout@v4 - name: Build igt Docker images run: | cd docker && make build-igt diff --git a/.github/workflows/codeql.yaml b/.github/workflows/codeql.yaml index 91f2827..9094c60 100644 --- a/.github/workflows/codeql.yaml +++ b/.github/workflows/codeql.yaml @@ -42,11 +42,11 @@ jobs: steps: - name: Checkout repository - uses: actions/checkout@v3 + uses: actions/checkout@v4 # Initializes the CodeQL tools for scanning. - name: Initialize CodeQL - uses: github/codeql-action/init@v2 + uses: github/codeql-action/init@v3.27.3 with: languages: ${{ matrix.language }} # If you wish to specify custom queries, you can do so here or in a config file. @@ -60,7 +60,7 @@ jobs: # Autobuild attempts to build any compiled languages (C/C++, C#, Go, or Java). # If this step fails, then you should remove it and run the build manually (see below) - name: Autobuild - uses: github/codeql-action/autobuild@v2 + uses: github/codeql-action/autobuild@v3.27.3 # ℹī¸ Command-line programs to run using the OS shell. # 📚 See https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#jobsjob_idstepsrun @@ -73,6 +73,6 @@ jobs: # ./location_of_script_within_repo/buildscript.sh - name: Perform CodeQL Analysis - uses: github/codeql-action/analyze@v2 + uses: github/codeql-action/analyze@v3.27.3 with: category: "/language:${{matrix.language}}" diff --git a/.github/workflows/reports.yaml b/.github/workflows/reports.yaml index 72a79ae..7c05e22 100644 --- a/.github/workflows/reports.yaml +++ b/.github/workflows/reports.yaml @@ -28,7 +28,7 @@ jobs: template: report token: ${{ secrets.SECURITY_TOKEN }} - name: GitHub Upload Release Artifacts - uses: actions/upload-artifact@v2 + uses: actions/upload-artifact@v4.4.3 with: name: report path: ./*.pdf \ No newline at end of file diff --git a/.github/workflows/reviewdog.yaml b/.github/workflows/reviewdog.yaml index fbcfbf0..d9941e5 100644 --- a/.github/workflows/reviewdog.yaml +++ b/.github/workflows/reviewdog.yaml @@ -13,11 +13,11 @@ jobs: pull-requests: write steps: - name: Checkout code - uses: actions/checkout@v3 + uses: actions/checkout@v4 with: ref: ${{ github.event.pull_request.head.sha }} - name: Install go - uses: actions/setup-go@v4 + uses: actions/setup-go@v5.1.0 with: go-version: '1.20' - name: Install golangci-lint @@ -49,7 +49,7 @@ jobs: run: | mkdir -p "$PWD"/scan_results ./bin/reviewdog -conf .github/.reviewdogConfig.yml -reporter=github-pr-check - - uses: actions/upload-artifact@v3 + - uses: actions/upload-artifact@v4.4.3 with: name: scan_results path: ${{ github.workspace }}/scan_results/ diff --git a/.github/workflows/scorecard.yml b/.github/workflows/scorecard.yml index 97cbb54..9574c85 100644 --- a/.github/workflows/scorecard.yml +++ b/.github/workflows/scorecard.yml @@ -32,12 +32,12 @@ jobs: steps: - name: "Checkout code" - uses: actions/checkout@93ea575cb5d8a053eaa0ac8fa3b40d7e05a33cc8 # v3.1.0 + uses: actions/checkout@v4 with: persist-credentials: false - name: "Run analysis" - uses: ossf/scorecard-action@0864cf19026789058feabb7e87baa5f140aac736 # 2.3.1 + uses: ossf/scorecard-action@v2.4.0 with: results_file: results.sarif results_format: sarif @@ -59,7 +59,7 @@ jobs: # Upload the results as artifacts (optional). Commenting out will disable uploads of run results in SARIF # format to the repository Actions tab. - name: "Upload artifact" - uses: actions/upload-artifact@3cea5372237819ed00197afe530f5a7ea3e805c8 # v3.1.0 + uses: actions/upload-artifact@v4.4.3 with: name: SARIF file path: results.sarif @@ -67,6 +67,6 @@ jobs: # Upload the results to GitHub's code scanning dashboard. - name: "Upload to code-scanning" - uses: github/codeql-action/upload-sarif@17573ee1cc1b9d061760f3a006fc4aac4f944fd5 # v2.2.4 + uses: github/codeql-action/upload-sarif@v3.27.3 with: sarif_file: results.sarif diff --git a/.github/workflows/trivy-scan.yaml b/.github/workflows/trivy-scan.yaml index e8897b3..d235777 100644 --- a/.github/workflows/trivy-scan.yaml +++ b/.github/workflows/trivy-scan.yaml @@ -16,10 +16,10 @@ jobs: runs-on: ubuntu-latest steps: - name: Checkout code - uses: actions/checkout@v3 + uses: actions/checkout@v4 - name: Run Trivy vulnerability scanner in fs mode - uses: aquasecurity/trivy-action@master + uses: aquasecurity/trivy-action@0.28.0 with: scan-type: 'fs' scan-ref: '.' @@ -28,6 +28,6 @@ jobs: trivy-config: ./github/.trivyConf.yaml - name: Upload Trivy scan results to GitHub Security tab - uses: github/codeql-action/upload-sarif@v2 + uses: github/codeql-action/upload-sarif@v3.27.3 with: sarif_file: 'trivy-results.sarif' \ No newline at end of file diff --git a/.github/workflows/trivyimagescan.yaml b/.github/workflows/trivyimagescan.yaml index 695d66c..02e6fbf 100644 --- a/.github/workflows/trivyimagescan.yaml +++ b/.github/workflows/trivyimagescan.yaml @@ -25,7 +25,7 @@ jobs: runs-on: "ubuntu-latest" steps: - name: Checkout code - uses: actions/checkout@v3 + uses: actions/checkout@v4 with: ref: main @@ -34,7 +34,7 @@ jobs: echo "running make build platform benchmark" cd docker && make build-platform - name: Run Trivy vulnerability scanner - uses: aquasecurity/trivy-action@7b7aa264d83dc58691451798b4d117d53d21edfe + uses: aquasecurity/trivy-action@0.28.0 with: image-ref: 'benchmark:platform' format: 'template' @@ -43,7 +43,7 @@ jobs: severity: 'CRITICAL,HIGH' - name: Upload Trivy scan results to GitHub Security tab - uses: github/codeql-action/upload-sarif@v2 + uses: github/codeql-action/upload-sarif@v3.27.3 with: sarif_file: 'trivy-results.sarif' @@ -56,7 +56,7 @@ jobs: runs-on: "ubuntu-latest" steps: - name: Checkout code - uses: actions/checkout@v3 + uses: actions/checkout@v4 with: ref: main @@ -65,7 +65,7 @@ jobs: echo "running make build xpum benchmark" cd docker && make build-xpum - name: Run Trivy vulnerability scanner - uses: aquasecurity/trivy-action@7b7aa264d83dc58691451798b4d117d53d21edfe + uses: aquasecurity/trivy-action@0.28.0 with: image-ref: 'benchmark:xpum' format: 'template' @@ -74,7 +74,7 @@ jobs: severity: 'CRITICAL,HIGH' - name: Upload Trivy scan results to GitHub Security tab - uses: github/codeql-action/upload-sarif@v2 + uses: github/codeql-action/upload-sarif@v3.27.3 with: sarif_file: 'trivy-results.sarif' @@ -87,7 +87,7 @@ jobs: runs-on: "ubuntu-latest" steps: - name: Checkout code - uses: actions/checkout@v3 + uses: actions/checkout@v4 with: ref: main @@ -96,7 +96,7 @@ jobs: echo "running make build igt benchmark" cd docker && make build-igt - name: Run Trivy vulnerability scanner - uses: aquasecurity/trivy-action@7b7aa264d83dc58691451798b4d117d53d21edfe + uses: aquasecurity/trivy-action@0.28.0 with: image-ref: 'benchmark:igt' format: 'template' @@ -105,6 +105,6 @@ jobs: severity: 'CRITICAL,HIGH' - name: Upload Trivy scan results to GitHub Security tab - uses: github/codeql-action/upload-sarif@v2 + uses: github/codeql-action/upload-sarif@v3.27.3 with: sarif_file: 'trivy-results.sarif' \ No newline at end of file